Identity and policy enforced inter-cloud and intra-cloud channel
First Claim
Patent Images
1. A method implemented in a non-transitory machine-readable storage medium and processed by one or more processors configured to perform the method, comprising:
- configuring a first process within a first cloud computing environment to manage select messages occurring within a communication channel within the first cloud computing environment, the communication channel is constructed within the first cloud environment based on a particular identifier that is associated with the select messages, and the communication channel is defined, identified, and communicated via a different communication channel that is used for some communication other than the communication channel that is to be monitored;
instantiating the first cloud computing environment with the first process executing therein; and
enforcing, by the first process, selective policy restrictions based on the select messages that enter and exit the communication channel, the first policy enforces the selective policy restrictions by consulting an identity service to obtain the selective policy restrictions and the policy restrictions include particular policies for the first process to authenticate the select messages based on;
identities of senders of the selective messages, identities of receivers of the selective messages, identities for the selective messages, identities for other cloud computing environments that the selective messages originate from or are being directed to, and an identity for the first process.
16 Assignments
0 Petitions
Accused Products
Abstract
Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds. Policy actions are enforced when processing the messages. The policy actions can include identity-based restrictions and the policy actions are specific to the messages and/or clouds within which the messages are being processed.
13 Citations
19 Claims
-
1. A method implemented in a non-transitory machine-readable storage medium and processed by one or more processors configured to perform the method, comprising:
-
configuring a first process within a first cloud computing environment to manage select messages occurring within a communication channel within the first cloud computing environment, the communication channel is constructed within the first cloud environment based on a particular identifier that is associated with the select messages, and the communication channel is defined, identified, and communicated via a different communication channel that is used for some communication other than the communication channel that is to be monitored; instantiating the first cloud computing environment with the first process executing therein; and enforcing, by the first process, selective policy restrictions based on the select messages that enter and exit the communication channel, the first policy enforces the selective policy restrictions by consulting an identity service to obtain the selective policy restrictions and the policy restrictions include particular policies for the first process to authenticate the select messages based on;
identities of senders of the selective messages, identities of receivers of the selective messages, identities for the selective messages, identities for other cloud computing environments that the selective messages originate from or are being directed to, and an identity for the first process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method implemented in a non-transitory machine-readable storage medium and processed by one or more processors configured to perform the method, comprising:
-
detecting within a first cloud computing environment an event that identifies a message to manage on behalf of the first cloud computing environment, a port defined for an event type that includes the event the port monitored for the event; acquiring a policy in response to an identity assigned to the message, the policy acquired from an identity service; and processing actions defined in the policy to authenticate the message based on;
identities of senders of the selective messages, identities of receivers of the selective messages, the identity for the message, an identity for the first cloud computing environment, and identities for other cloud computing environments that the message originates from or are being directed to. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A multi-processor implemented system, comprising:
-
a first processor configured to execute a cloud configurator; and a plurality of second processors, each second processor configured to execute one or more cloud channel managers; the cloud configurator configured to instantiate cloud computing environments, each cloud computing environment processing on one or more the second processors, and each cloud computing environment having one or more of the cloud channel managers, each cloud channel manager configured to handle inbound and outbound messages occurring over a particular communication channel and within that cloud channel manager'"'"'s cloud computing environment and enforcing policy and identity restrictions for each of the inbound and outbound messages processed, the cloud channel manager configured to enforce the identity restrictions based on a policy acquired from an identity service and the enforcement for authentication of;
identities of senders of the outbound messages, identities of receivers of the inbound messages, identities for the inbound and outbound messages, identities for the cloud computing environments that the inbound messages originate from or that the outbound messages are being directed to, and wherein each particular communication channel is constructed within each cloud computing environment based on a particular events of defined types that are associated with the inbound and outbound messages. - View Dependent Claims (17, 18, 19)
-
Specification